11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4: Design Guidelines for Secure <strong>Web</strong> <strong>Application</strong>s 71AuthenticatingusersPreventingparametermanipulationProvidingsecureconfigurationH<strong>and</strong>lingexceptionsProtectingsensitive data<strong>Web</strong>Server<strong>Application</strong>ServerDatabaseServerBrowserFirewall<strong>Web</strong><strong>Application</strong><strong>Application</strong>sDatabaseProtectingsensitivedataPreventingsessionhijacking <strong>and</strong>cookie replayattacksValidatinginputAuthorizingusersAuditing <strong>and</strong>logging activity<strong>and</strong>transactionsAuthenticating<strong>and</strong> authorizingupstreamidentitiesEncrypting orhashingsensitivedataFigure 4.1<strong>Web</strong> application design issuesThe design guidelines in this chapter are organized by application vulnerabilitycategory. Experience shows that poor design in these areas, in particular, leads tosecurity vulnerabilities. Table 4.1 lists the vulnerability categories, <strong>and</strong> for each onehighlights the potential problems that can occur due to bad design.Table 4.1 <strong>Web</strong> <strong>Application</strong> Vulnerabilities <strong>and</strong> Potential Problem Due to Bad DesignVulnerability CategoryInput ValidationPotential Problem Due to Bad DesignAttacks performed by embedding malicious strings in query strings,form fields, cookies, <strong>and</strong> HTTP headers. These include comm<strong>and</strong>execution, cross-site scripting (XSS), SQL injection, <strong>and</strong> bufferoverflow attacks.AuthenticationAuthorizationConfiguration ManagementIdentity spoofing, password cracking, elevation of privileges, <strong>and</strong>unauthorized access.Access to confidential or restricted data, tampering, <strong>and</strong> executionof unauthorized operations.Unauthorized access to administration interfaces, ability to updateconfiguration data, <strong>and</strong> unauthorized access to user accounts <strong>and</strong>account profiles.(continued)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!